
News for today:
- AidenRescue for post-ransomware endpoint recovery. Aiden Technologies launched AidenRescue for Windows, to streamline / safeguard endpoint recovery after a ransomware incident or other catastrophic event. AidenRescue … can fully wipe, rebuild, and reconfigure any compromised device without relying on local infrastructure, recovery partitions, or pre-built images. Aiden Technologies
- An argument for Donoma Seshat. Donoma discusses the recent Red Hat data breach of 570GB of data from 28,000 internal repositories, and outlines how its Seshat continuous encryption solution would have prevented the breach. The Red Hat breach exposes what security experts call the “decrypt to use” vulnerability, and it’s likely undermining your defenses at this very moment. Here’s the uncomfortable reality: operational databases are never truly “at rest.” They run continuously, processing thousands of queries per second. Your encryption-at-rest strategy provides zero protection when data is actively being used, which is essentially always. Seshat eliminates the “decrypt to use”vulnerability. Donoma
- New identity and data security innovations from Netwrix. Netwrix updated its 1Secure SaaS platform with new capabilities to defend against identity-based attacks and AI-empowered attacks after sensitive data. Key updates: unified visibility of identity and data risks across hybrid environments, restoration / recovery of Okta objects and metadata, and AI DLP capabilities, among others. Netwrix
- HackerOne Hai and HackerOne Code. HackerOne changed Hai from a copilot to an agentic AI system and released HackerOne Code, an AI-native code security product. The focus of both is continuous exposure management. Hai is HackerOne’s coordinated team of AI agents that continuously analyze and contextualize findings to help organizations prioritize, validate, and remediate risks faster, guided by insights from over 500,000 validated vulnerabilities. 70% of users cite time savings as the biggest impact, with users saving up to 40+ hours every month, a full work week. HackerOne Code scales vulnerability discovery with AI (safeguarded by human oversight), and will support Agentic Pentest as a Service soon. HackerOne
- More identity security goodness from Saviynt. Saviynt expanded its identity security capabilities to support more applications and secure additional identity types. For applications, Saviynt released an agentic AI-powered onboarding solution for seamlessly onboarding, governing, and securing connected and disconnected applications. For securing additional identity types, its ISPM solution more fully supports AI agents and non-human identities. Saviynt is … extending its Identity Security Posture Management (ISPM) capabilities to cover all identities – human, non-human, and AI. These enhancements empower enterprises to confidently adopt AI while maintaining full visibility, governance, and compliance. Saviynt